2012 8th International Conference on Wireless Communications, Networking and Mobile Computing 2012
DOI: 10.1109/wicom.2012.6478429
|View full text |Cite
|
Sign up to set email alerts
|

Analysis on Security Issues for Mobile P2P Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Pollution is categorized based on the attackers’ strategy: (1) metadata pollution, where a file extension or name is modified and replaced with a misleading one; (2) content pollution, where the file content is changed; and (3) index pollution, where an attacker claims ownership of an unindexed bogus file and uploads its record (IP address, port number, etc) to the entities (eg, super peers on hybrid P2P) that maintain such records for distribution [ 73 , 77 ]. In most cases, the polluters also attack legitimate peers’ reputations or boost their own reputation through whitewashing attacks [ 75 , 76 ]. Content pollution is the most popular and common attack in P2P streaming systems [ 74 ]; it was detected in 50%-80% of files in KaZaA and about 50% of popular files in eDonkey [ 73 , 74 ].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Pollution is categorized based on the attackers’ strategy: (1) metadata pollution, where a file extension or name is modified and replaced with a misleading one; (2) content pollution, where the file content is changed; and (3) index pollution, where an attacker claims ownership of an unindexed bogus file and uploads its record (IP address, port number, etc) to the entities (eg, super peers on hybrid P2P) that maintain such records for distribution [ 73 , 77 ]. In most cases, the polluters also attack legitimate peers’ reputations or boost their own reputation through whitewashing attacks [ 75 , 76 ]. Content pollution is the most popular and common attack in P2P streaming systems [ 74 ]; it was detected in 50%-80% of files in KaZaA and about 50% of popular files in eDonkey [ 73 , 74 ].…”
Section: Resultsmentioning
confidence: 99%
“…This enables the attacker to own a deciding power of where in the ID space the new nodes are placed. When the attacker owns more nodes than the benign nodes in the segment, the attacker can control messages in the segment, bias reputation score, create DDoS situations, or force servers to exceed their CPU capacity [ 26 , 76 , 84 ], which is also known as a gateway attack [ 92 ]. In blockchain P2P networks, Sybil attacks are, for instance, used by attackers to outvote the honest nodes in the network [ 52 , 63 , 104 ], which enables the attacker to cheat without being detected.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation